Resort security
barox Kommunikation AG, the global manufacturer of professional standard switches, PoE media converters, and IP extenders, will be participating in the Milestone Xperience Day UK as a key technology partner. Taking place between 17-18 September at The Belfry Hotel & Resort Luxury Hotel in Sutton Coldfield, the event is billed as a premier opportunity for networking and knowledge exchange with attendees personally invited by Milestone. Smart-barox plug-in Following the release...
Casino operators have long been among the keenest users of video surveillance technology, but there is strong demand for even more advanced solutions, reports IDIS, South Korea’s largest in-country video tech manufacturer. In a new report on surveillance in the casino sector, the company explains how a generation of major resort casinos is emerging—new developments comprising luxury hotels, state-of-the-art gaming, high-end retail, wellness, and leisure facilities—have a...
Camden Door Controls is pleased to bring to market its CX-EPD0009 magnetic cabinet lock. Sporting an ultra-compact design, it is an easily installed high-security lock for virtually any enclosure door, such as computer cabinets, refrigerators, lockers, and retail display counters. Easy to install and operate This 12V or 24V magnetically operated lock has an incredibly strong holding force of 440 lbs. and is water-resistant for indoor or outdoor use, making it ideal for humid envir...
G2E Asia and the Asian IR Expo – the key marketplace for the gaming, entertainment and integrated resorts sectors – hosted at The Venetian Macao, officially open their doors, expecting to welcome more than 8,000 industry professionals from 80 countries and regions. The joint event commences with a keynote address by Bill Miller, President and CEO of the American Gaming Association, followed by an opening ceremony featuring prominent industry pioneers. The day will also include a G2E...
Over three in ten US-based critical infrastructure organisations (36%) that have fallen victim to a ransomware attack have risked legal repercussions by paying a ransom. The findings are in new research by pioneering cybersecurity services firm Bridewell, surveying 519 staff responsible for cybersecurity at US critical infrastructure organisations in sectors such as civil aviation, telecommunications, energy, transport, media, financial services and water supply. Infringing UK and US laws 66%...
G2E Asia, the pioneering gaming and entertainment marketplace in Asia, proudly announces its return to Macau on June 4-6, 2024, marking its 15th anniversary milestone. In collaboration with the Asian IR Expo, this year’s event is set to deliver an enhanced experience in all aspects of the expo, with 360-degree opportunities across the gaming, entertainment, and integrated resort industries. Aligned with the industry’s growing focus on technology, G2E Asia’s 15th edition will u...
News
Vismo will launch the latest version of its Locate & Protect App at the International Association for Healthcare Security and Safety (IAHSS) Annual Conference and Exhibition 2024, at booth #713, from April 29 - May 1, in Loews Royal Pacific Resort, Universal Orlando, in Orlando, Florida, USA. Featuring improved support for new Android and iOS mobile devices including deploying the latest technology to swiftly access critical functions, the app also includes location risk Insights for the first time. New features “Insights” includes a risk gauge to give users a quick-to-understand overview of safety levels in any location, based on real-time intelligent location delivered by one or more risk intelligence providers. Use of the feature requires a license with a risk provider such as Dataminr, Factal, and Riskline. Other new features include more accurate location testing to give a more useful GPS location to users. It achieves this through GPS tracking technology that enhances accuracy and precision via improved latitudinal and longitudinal coordinate measures regardless of where the user is. Additional features There is also: A new iteration of the user interface that enables quick and easy access to different activities and information, eliminating the need to navigate through different screens Enhanced diagnosis and repair features to ensure the user’s device is working optimally. Vismo Locate & Protect App Vismo Locate & Protect App helps to promote a culture of safety and security within the healthcare industry The Vismo Locate & Protect App helps to promote a culture of safety and security within the healthcare industry, leading to better outcomes for employees. IAHSS was established to foster and promote the welfare of the public through educational and scientific research and the development of a healthcare security and safety body of knowledge. Closely aligned “Our approach to personal well-being is closely aligned to the aims of IAHSS,” says Colin Dale, Vismo Global Sales Director, adding “It’s the driving force for us attending the IAHSS Annual Conference and Exhibition for the first time with our full scope of location and tracking capabilities in the healthcare sector." “Attendees are very welcome to visit us at booth #713 to see how we can help,” he continues.
ASSA ABLOY Opening Solutions is showcasing its expanded offering of products available within the United States and Canada at the 2024 ISC West Conference. As part of its commitment to providing cutting-edge solutions, ASSA ABLOY will feature an extensive range of new technology aimed at enhancing access control, security, and convenience for businesses of all sizes. Access control and security “We must continuously broaden our offering to address the changing security landscape,” said Angelo Faenza, Head of Digital Access Solutions, ASSA ABLOY Opening Solutions Americas. “At ASSA ABLOY, we are dedicated to pushing the boundaries of innovation to provide our customers with the most advanced access control and security solutions available. The breadth of technology we’re showcasing at ISC West demonstrates our ongoing commitment to meeting the evolving needs of our customers and the industry as a whole.” Products on display Visit Booth #8061 to explore the latest advancements in comprehensive door security and access control and discuss real-world challenges with the ASSA ABLOY team of experts. Some of the latest innovations ASSA ABLOY will showcase include: Centrios Small Business Solution: Created for small and growing businesses, Centrios is an all-in-one software and hardware access control solution with simplicity, scalability, and flexibility to meet the unique needs of these operations. Control iD Facial Identification and UHF Readers: Control iD Facial Identification and UHF Readers include advanced authentication and long-range reading capabilities, ensuring secure access control in more environments. Data centre Security Solutions: Addressing the growing demand for and reliance on data centre operations, ASSA ABLOY will showcase its range of solutions for comprehensive data centre security, from perimeter fencing and high security, high-performance doors to scalable access control and power management solutions. DoorBird IP Video Intercom: Revolutionising communication and access control, DoorBird IP Video Intercom combines state-of-the-art video technology with seamless integration, enabling users to remotely manage access to their properties with ease. Luxer One - Smart Lockers: Redefining package management, Luxer One - Smart Lockers provide contactless delivery and retrieval solutions, enhancing convenience and efficiency for a multitude of users, such as property managers, residents, students, employees, consumers, and more. Securitech: Known for securing the most important doors, Securitech offers a robust range of innovative life-safety and forced-entry solutions designed to meet the most stringent security and code requirements for commercial, institutional, and industrial applications. Sustainability, AI, and cybersecurity Be sure to attend to learn strategies for navigating the latest trends and achieving sustainable growth ISC West attendees who would like to help assemble care packages for deploying and returning US military personnel and their families should attend the ASSA ABLOY USO Bag Build. It will be held in ASSA ABLOY booth #8061 on Wednesday, April 10, from 2:00 p.m. to 4:00 p.m. ASSA ABLOY will also host its 18th annual ISC West Breakfast on Thursday, April 11, from 8:00 a.m. - 9:30 a.m. in Ballroom H at the Venetian Resort. A panel of distinguished experts will discuss three critical trends shaping the security industry: sustainability, AI, and cybersecurity. Be sure to attend to learn strategies for navigating these trends and achieving sustainable growth. Companies attending ISC 2024 Other ASSA ABLOY Group companies also exhibiting at ISC West 2024 include Alarm Controls - 5065, Ameristar Perimeter Security – 8081, ASSA ABLOY Entrance Systems – 7071, Centrios – 8064, DoorBird – 9074, HID Global – 8053, Kwikset – 4097, LifeSafety Power - 9073, Mul-T-Lock – 8075, Securitech – 5061, and Traka – 7077.
Barrier1 Systems, the industry pioneer in perimeter-hardening physical security vehicle barriers, invites NATSO Connect 2024 attendees to interact with their range of crash-rated security bollards at booth #219, February 20-22 at Disney’s Yacht and Beach Club Resort. Vehicle barrier experts will be positioned alongside the company’s storefront bollards to communicate the value of anti-ram vehicle barrier solutions as they apply to truck stops and the travel centre industry. Effective security solutions “Travel centres, truck stops, and gas stations invest heavily in traditional security systems to keep their customers safe, but may not always be thinking about the risks and liabilities that occur when a vehicle slams into a storefront,” said Mark Borto, CEO, Barrier1. “From personal injury to unforeseen downtime and higher insurance premiums, our field-proven solutions address these unforeseen threats.” Barrier1 Systems provides high-quality, crash-rated security bollards that prevent vehicle accidents Barrier1 Systems provides high-quality, crash-rated security bollards that prevent vehicle ramming accidents before they happen. By investing in these simple, yet effective security solutions, truck stop business owners can protect their customers from bodily harm and themselves from the costly liabilities associated with storefront crashes. Barrier1 safety bollards Unlike conventional bollards available, Barrier1 safety bollards undergo rigorous crash testing and meet the standards set by the American Society for Testing and Materials (ASTM). Barrier1 offers bollards that are crash-tested and rated F3016 S10/P1 all the way up to ASTM F2656 M50/P1. That will cover the against impacts from a 5,000 lb pickup truck travelling at 10 mph up to a 15,000 lb medium duty truck travelling at 50 mph. NATSO Connect attendees can stop by booth #219 to see the Tomcat S10-P1 Storefront Bollard NATSO Connect attendees can stop by booth #219 to see the Tomcat S10-P1 Storefront Bollard, a crash-rated bollard designed to stop a 5,000 lb vehicle travelling at 10 mph. Tailored to provide enhanced safety in high-traffic, low-speed locales, including retail locations, fast food restaurants, banks, and sidewalks, the Tomcat S10 ensures pedestrian well-being is a top priority. Ideal bollard solution Also on display is the Tomcat S30 Storefront Bollard (crash test pending), capable of halting a 5,000 lb vehicle travelling at 30mph, making it an essential tool for areas with increased security and safety needs. As with other Barrier1 products, the Tomcat S30 is designed for easy retrofitting with same-day excavation and installation. Barrier1 Systems’ complete range of safety bollards are available in a variety of types, designs, and colours, ensuring consistent levels of performance and quality that seamlessly match storefront aesthetics. The dedicated team at Barrier1 Systems is available for collaboration and committed to finding the ideal bollard solution that meets an organisation’s specific design and security requirements.
Telcom, the UK’s provider of dedicated business connectivity, has been selected as a strategic partner to deliver its best-in-class connected building solution Preconnect® to the commercial office space at St. Michael’s Manchester. St. Michael’s Manchester A long-term project by Gary Neville’s development company, Relentless Developments, and its strategic partners, St. Michael’s is a £400 million mixed-use development in the heart of the city. Combining nine floors of best-in-class office space with a five-star hotel, 217 luxury apartments, and a new public square, St. Michael’s has been described by Councillor Bev Craig, pioneer of Manchester Council, as “a defining regeneration project for our city centre.” Mixed-use development No. 2 St. Michael’s - a £250 million, 41-story tower will house a 162-bed five-star W Hotel, W Residences No. 1 St. Michael’s, the £150 million first phase of the development, will be completed in 2024 and is expected to be Manchester’s first fully net-zero carbon commercial development in operation and delivery. No. 2 St. Michael’s - a £250 million, 41-story tower will house a 162-bed five-star W Hotel, W Residences, and 75,000 sq ft of office space. The second phase is expected to be completed in 2027. Preconnect® Telcom has been selected as a key strategic partner with property consultants Zerum to supply No. 1 St. Michael’s with its connected buildings solution Preconnect®. This will ensure commercial office tenants have access to fast and reliable full fibre dedicated business internet up to 10Gbps that’s up and running within 24 hours. Full fibre internet connectivity Preconnect® will deliver dedicated full fibre internet connectivity with symmetrical speeds up to 10Gbps Installed throughout the office space and up to the rooftop restaurant where the Japanese-Peruvian restaurant brand, Chotto Matte, will be located, Preconnect® will deliver dedicated full fibre internet connectivity with symmetrical speeds up to 10Gbps. This will be delivered on Telcom’s own fibre and rooftop wireless network across the city, making a 100% uptime guarantee available for businesses with a backup connection in place. St. Michael’s will be targeting a Platinum Wiredscore and Preconnect® will be fundamental to this as it guarantees a minimum connectivity rating of Gold. Unparalleled connection experience Steven Calder, Head of Connected Buildings at Telcom, commented, “We are immensely proud to be a part of the St. Michael’s development. As a Mancunian-born company, Telcom couldn’t be more humbled or thrilled to be contributing to the revitalisation and development of our city’s historic centre." "Preconnect®, our market-pioneering commercial property solution, will give tenants an unparalleled connection experience by getting them connected to 10Gbps full fibre internet in as little as 24 hours." No upfront costs Provide seamless, full fibre internet connectivity in support of their business objectives" "What’s more is that there’s absolutely no cost to the building owner or management company for the upfront installation and ongoing management." "We look forward to working with Relentless Development, their partners, and the future tenants of St. Michael’s to provide seamless, full fibre internet connectivity in support of their business objectives.” Hyperfast, reliable, and convenient connectivity Anthony Kilbride, Co-Director, of Relentless Developments, commented, “St. Michael’s is a highly ambitious development set to transform this critical yet underused area of Manchester into a world-class destination for work, stay and play." "We wouldn’t be able to achieve our pioneering vision for the scheme without collaborating with forward-thinking partners like Telcom, who are game changers in their sector. Delivering hyperfast, reliable, and convenient connectivity for our commercial tenants is going to play a big part in making St. Michael’s one of the most sustainable and smart spaces in the UK.”
Often overlooked, storage for valuables, documents, and personal items deserves the same protection as offices, labs, or accommodation. Yet many access solutions leave these important access points poorly secured. Running two systems in parallel Intelligent electronic control often stops at the door, ignoring the critical safety needs of many forgotten openings. One common facilities management solution is to run two systems in parallel: electronic access for doors, and mechanical security for “non-door” openings which many electronic systems cannot accommodate. Challenges with multiple systems Users carry multiple credentials, so there is more chance they lose one However, running two access control workflows based on different technologies increases risk and complexity, and eats up admin time. Users carry multiple credentials, so there is more chance they lose one. Security teams must issue, track, and monitor multiple credentials and credential types. It creates an unnecessary hassle for everyone. A growing need for “non-door” security A cabinet or drawer lock fitted at relevant points, and integrated with the central system, can give many valuable assets the security they require. Once integrated with the system software, this electronic device can deter unauthorised access and reduce workplace theft which in the USA alone may cost businesses $50 billion each year. Enhanced cabinet security In the healthcare sector, enhanced cabinet security can protect medicines and confidential documents. In universities and schools, students and staff experience peace of mind when they can leave belongings in lockers in communal areas or changing rooms that are properly secured. Security concerns Many office users don’t have “their” desks, where confidential or valuable assets are stored safely In today’s more flexible workplaces, many office users don’t have “their” desks, where confidential or valuable assets are stored safely. They just use “a” desk. Unsurprisingly, according to business services provider Clutch, almost a quarter of coworking space users have security concerns. Easy to install, convenient, and economical The right cabinet security does more than just save management time. It also helps building users become relaxed about their belongings’ safety. How, then, can facilities managers identify the best devices, easy to install, convenient, and economical to run and integrate them without expense or hassle? Hardware solutions to integrate overlooked openings ASSA ABLOY offers a choice of security solutions for these forgotten access points. In many cases, multiple non-door locking types may also be integrated with a third-party system and managed together, to maximise the flexibility and efficiency of security admin. Aperio® KL100 Its tiny footprint and wire-free operation ensure quick installation without causing damage The new battery-powered Aperio® KL100, for example, secures lockers, cabinets, cupboards, drawers and more. It makes almost any small opening an integral part of an electronic access control system. Designed for minimal disruption to furniture, its tiny footprint and wire-free operation ensures quick installation without causing damage or making a visual impact. It integrates seamlessly with any new or existing access control system from over 100 different manufacturers and counting. Safe storage of documents Finavia, the operator of Helsinki Airport, must lock all types of openings, from doors and cabinets to fences and cargo. Devices all integrate seamlessly with their Lenel access control system. Check-in desks are fitted with Aperio KL100 locking, to ensure travel documents are stored safely. Audit trail capability simplifies the process of learning who accessed the storage and when. Easy to monitor This is much easier to monitor than mechanical key security, “When employees change, their access is disabled,” explains Kari Mäkinen, the airport’s Senior Access Control Specialist. “Or if the card is lost, it can be completely removed from the system. With mechanical keys, that process is much harder.” SMARTair system SMARTair e-motion Cabinet Locks with integrated RFID readers work with a wide range of credentials At Funway Academic Resort, student accommodation in Madrid, a single SMARTair system provides flexible, reliable electronic protection for bedrooms, common areas, and student safes. No sensitive openings are overlooked. Part of the SMARTair® complete access control solution, SMARTair e-motion Cabinet Locks with integrated RFID readers work with a wide range of credentials. They offer convenient unlocking via smartphone and are easily managed together with wireless door-locking devices and electronic padlocks using SMARTair’s intuitive software. Programmable key-based security ASSA ABLOY also offers programmable key-based security for non-door openings such as gates, lockers, cabinets, and vending machines. With CLIQ® users enjoy the convenience of carrying just one programmable battery-powered smart key which unlocks every door or access point they are authorised to open. Access rights are managed efficiently with a choice of remote or locally installed software.
From 10 to 13 October, the global airport community will gather for the 24th edition of inter airport Europe at the Munich Trade Fair Centre in Germany. The event returns with an impressive line-up of well over 400 airport suppliers from 37 countries, including seven national pavilions and more than 100 new exhibitors. Live exhibits Visitors can look forward to plenty of live exhibits in the halls and Outdoor Area and a new 600 square metre GSE Experience Area. An exciting event programme including Technical Seminars, Innovation Awards, and the co-located inter airport FOCUS, The Sustainability Summit provides interesting opportunities to further engage with new technologies and suppliers, all dedicated to improving airport performance while delivering a return on investment. New economic importance inter airport Europe has developed into the most senior gathering of global airport operators, airlines, CAAs, service suppliers The Munich Trade Fair Centre will once again turn into the world’s biggest hub for exploring and sourcing new technology, equipment, and services for better airports. Over nearly 50 years, inter airport Europe has developed into the most senior gathering of global airport operators, airlines, CAAs, service suppliers, investors, and other experts in this sector. The upcoming event marks another milestone for the airport industry which is currently rising to new economic importance with a multitude of opportunities and challenges. Airport professionals Airport professionals from more than 100 countries have already registered as visitors, including key representatives from AENA, Air France, Deutsche Lufthansa, Fraport AG, Heathrow Airport, İGA Istanbul Airport, Oman Airports, Shell Aviation, WISAG, and many more. Over four exhibition days, they can explore an excellent cross-section of technologies and services for the entire airport supply chain, including airside operations, terminal management, passenger services, baggage handling, safety and security, airport IT, air traffic control, airport maintenance, and environmental management. Insights into technology innovations Networking and knowledge platform on how to develop, embed, and integrate sustainability strategies An impressive programme of accompanying events offers additional insights into technology innovations about wider market trends. These include Technical Seminars, Innovation Insight Sessions, the prestigious Innovation Awards, and the co-located inter airport FOCUS Sustainability Summit, a two-day, high-profile networking and knowledge platform on how to develop, embed, and integrate sustainability strategies into every aspect of airport life. Roadmap to airport operations “Co-locating exhibition and summit is an exciting opportunity for us to provide more value to the global airport community. Both events naturally complement each other, providing attendees with a great roadmap to future-proof their airport operations,” says Olaf Freier, Portfolio Director Transport of inter airport Europe, on behalf of show organiser RX. “The co-location offers new and encouraging perspectives that will help pave the way for innovation, resilience, and sustainability at future airports.” inter airport Europe at a glance: Indoor and outdoor stands with live equipment Over 30% of exhibitors are newcomers on the inter airport show floor, forming an impressive line-up A large show floor in halls B5, and B6, and the adjacent outdoor area invite visitors to discover more than 400 suppliers who deliver advanced airport equipment, technology, and services across the globe. The top five exhibitor countries are Germany, Italy, the United Kingdom, France, and the Netherlands, with 37 countries represented in total. Over 30% of exhibitors are newcomers on the inter airport show floor, forming an impressive line-up of well-known international brands alongside promising startups and scaleups. A new 600 square metre GSE Experience Area, sponsored by Weihai Guangtai Airport Equipment, will offer visitors the opportunity to see the latest equipment for aprons and runways live and in action. National Pavilions and First-time Exhibitors Several National Pavilions will feature this year – Italy, France, the UK, the Netherlands, Finland, and newcomer Spain, all showcasing some of their countries’ finest tech companies and products. Long-term show partner GATE (The Airport Technology Network) will be hosting a number of its members at their dedicated GATE Pavilion again. In addition, there will be two First-time Exhibitor pavilions specifically dedicated to companies new to inter airport Europe. Opening and Innovations Awards Ceremony The spotlight on best practices, technologies, and partnerships that drive innovation and excellence The inter airport Europe Innovation Awards celebrate the achievements of the many inventors and technical pioneers within the exhibitor community, putting the spotlight on best practices, technologies, and partnerships that drive innovation and excellence for better airports. The winners will be announced at the Opening and Innovation Awards Ceremony on Tuesday, 10th October, 11:00 - 12:00, at the Seminar Theatre in Hall B5. Welcoming presentations include speeches from Nicola Hamann, Managing Director at RX, Kay Bärenfänger, President at GATE Alliance, and Jost Lammers, CEO at Munich Airport. Seminar Programme: Three days of expert talks The free-to-attend inter airport Europe Seminar features a selection of technical talks on pioneering solutions and approaches to pressing airport issues, including the Innovation Insight Sessions featuring participants of the Innovation Awards. The 15-to-30-minute sessions will touch on key aspects of the passenger experience and passenger journey, baggage handling, security systems, as well as ramp and terminal management. The technical seminars will run between 10 - 12 October at the Seminar Theatre in Hall B5, stand B5-1580. Visit the show website for the full seminar agenda. inter airport FOCUS – The Sustainability Summit The Sustainability Summit offers two days of top-tier education, networking, and collaboration opportunities The co-located inter airport FOCUS – The Sustainability Summit offers two days of top-tier education, networking, and collaboration opportunities for aviation stakeholders looking to develop, discuss, or initiate sustainability measures required to reach their net zero commitments, including sustainable airport operations, net-zero infrastructure, and new mobility concepts. inter airport FOCUS takes place on 11 and 12 October at the Press Centre East Entrance (Rooms 1A, 1B, 2). The Summit tickets can be purchased online or on-site and also include free entry to the inter airport Europe exhibition and seminars. For the full summit programme, please visit inter airport FOCUS. Visitor tools, Matchmaking Visitors are invited to use the Exhibitor List Tool and Online Show Preview to search for products and companies that are of particular interest to them. Once registered, visitors have access to the inter airport Europe Matchmaking Platform, allowing them to send or receive meeting invitations based on their business requirements. Meetings can be arranged at the exhibitor’s stand or in the dedicated meeting lounge in Hall B6, stand B6-590. Hosted Buyer Programme The Hosted Buyer Programme offers a tailored networking experience with industry pioneers The Hosted Buyer Programme offers a tailored networking experience with industry pioneers from airfield construction, ground handling, ground support equipment, interior design, hardware and software solutions, terminal infrastructure, and operations in the 2023 group. It focuses on growing markets and emerging regions, with buyers from UAE, India, Kenya, South Africa, Saudi Arabia, and Ghana, and it is an excellent opportunity to open up new markets for exhibitors. Venue, tickets, and opening times inter airport Europe 2023, the 24th International Exhibition for Airport Equipment, Technology, Design, and Services, takes place in halls B5, B6, and the adjacent outdoor area at the Munich Trade Fair Centre in Germany. Access to the exhibition halls is via Entrance East. Please visit the Online Travel Hub for further information on transport, accommodation, and visa. Show opening hours are from 9:00 AM to 5:00 PM on Tuesday, Wednesday, and Thursday (10 to 12 October), and from 9:00 AM to 3:00 PM on Friday (13 October). Visitors can register via the Online Ticket Shop and benefit from a reduced price when purchasing their ticket in advance. Day tickets cost €42 online or €52 on-site; season tickets cost €62 online or €72 on-site.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand car salesperson or estate agent of the popular imagination. Management of added services Yet we buy from retailers and marketplaces every day without complaint. As long as we see a middleman as providing value and convenience rather than getting in the way, they’re safe. This does mean, however, that resellers and integrators need to carefully manage how they are perceived and how much their added services are valued by their customers. The risk to security integrators Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies Businesses have often relied on security integrators to break down silos between security systems to strengthen both physical and cybersecurity postures. Typically, these have been seen as separate, but the increase in remote working and the adoption of cloud-based physical security has blurred the lines between the physical and the digital. Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies, rather than a siloed approach that will mean one is more secure than the other, and security integrators can help bridge this gap. Macroeconomic headwinds, digital transformation Security integrators have also proved invaluable in filling skill gaps within organisations. Not every business can be expected to have the staff and skills needed to successfully overcome integration challenges, they may have cybersecurity and physical security experts, but perhaps not both. And if they do have experts on staff, they may lack knowledge of the cutting-edge technologies that will protect their businesses best. This unique and esteemed role of security integrators is today at risk of disruption. Macroeconomic headwinds mean that businesses are scrutinising every budget line and asking if each is necessary. Digital transformation means they are questioning old ways of doing things are the providers they worked with five years ago, or longer, the same people who are going to give them the best value today? Research findings on current trends Unfortunately, many security integrators are not keeping up with change. Our research has found that only 26% of customers consider integrators up to date with the latest technologies. Businesses rely on these providers to navigate a new and confusing security landscape and only one in four say they are confident their partners have researched the road ahead. In the past, providers may have relied on having better knowledge than their customers. But 73% of security solutions buyers are doing their research on vendors and technology. Integrators risk being underprepared to serve a market that is more and more educated in the products they are providing a dangerous situation for any middleman. Finding the gap Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? The research suggests a shrinking gap for security integrators. Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? However, the problem may not be as dire as the research first suggests as long as integrators act to address the risks they face. Education Businesses are educating themselves about the market. They want to know what is available to stay safe, both in a physical environment and from online threats. This is understandable given how the news cycle, both of these spaces have seen an increase in potential threats, and the cost of cleaning up after a ransomware or similar attack has spiralled. Any sensible business will review what they have in place and their future options. Advance industry knowledge It has never been more important for the integrator community to advance their industry knowledge. They truly are the experts, and have an in-depth understanding of the latest trends, the advancement in cloud security, and the shifting demands of users. They also need to provide better service and consultancy. As the security world gets smarter and more cloud-based, security integrators who are well-informed and educated will have a clear advantage in the market. After all, most businesses don’t want to spend time researching and upskilling in areas where they can effectively outsource. Security integrators must be able to reassure their customers that they are up to the task. Bring on added value But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value The problem may be perceptions rather than the actual value that integrators can offer. If integrators are more informed than their customers realise, they need to do more to let their customers know. This could be down to being too reactive i.e., not anticipating customer needs and simply waiting for them to ask for particular services or products or not demonstrating knowledge as part of regular customer service. There is still very much of a gap for security integrators in today’s market. They can survive in this gap. But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value, more than a middleman, but a provider that can advise on the right products to meet specific needs and make those products work for their customers in an integrated way. Reinventing via consultancy They need to provide consultancy so their customers understand how best to ensure online and physical security work together to keep a business safe. Most of all, they need to demonstrate their knowledge to their customers and make sure they understand the value they bring. Businesses won’t be safer by relying on their research and knowledge to buy and install security products, but if they don’t understand the benefits of a specialist integrator, they may choose this route. It’s up to security integrators to reinvent themselves as the better kind of middleman if they want to remain relevant.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Casinos offer several attractive applications for LiDAR, including security and business intelligence. Using laser sensors, the technology can replace the use of surveillance cameras. For casino security, LiDAR can track player movement and provides complete coverage and accuracy that have not been achievable by surveillance cameras. Massive coverage areas can save on costs of sensor deployment versus other technologies. LiDAR and its applications LiDAR is a method for determining ranges by targeting an object with a laser and measuring the time for the reflected light to return to the receiver. LiDAR sensors emit pulsed light waves into a surrounding environment, and the pulses bounce off surrounding objects and return to the sensor. The sensor uses the time it took for each pulse to return to the sensor to calculate the distance it travelled. LiDAR is commonly used in markets such as robotics, terrestrial mapping, autonomous vehicles, and Industrial IoT (Internet of Things). Today, casinos offer a lucrative emerging market for technology. LiDAR tracking enables casino operators to understand the guest path, journey, queue time, count Crowd management LiDAR can contribute to a casino’s guest experience by counting people at doors or in sections of the gaming floor to provide intelligence about crowd size to track occupancy. LiDAR tracking enables casino operators to understand the guest path, journey, queue time, count, and other statistical information by comparing previous time frames to current occupancy levels. This approach allows them to understand digital media advertisement and experience placement. Aid in advertisement “Inside a casino, sensors are deployed like surveillance cameras,” says Gerald Becker, VP of Market Development & Alliances, Quanergy. “But instead of security, they are used to provide anonymous tracking of all people walking through the gaming floor. We can get centimetre-level accuracy of location, direction, and speed of the guests. With this data, we can access the guest journey from the path, dwell count, and several other analytics that provides intelligence to operations and marketing to make better decisions on product placement or advertisement.” Quanergy Quanergy is a U.S.-based company that manufactures its hardware in the USA and develops its 3D perception software in-house. Quanergy has various integrations to third-party technology platforms such as video management systems (VMSs) in security and analytics for operational and business intelligence. Perimeter security Sensors can be mounted to a hotel to monitor for potential objects being thrown off the hotel LiDAR is deployed in both exterior and interior applications. For the exterior of a casino or resort, sensors can be mounted to a hotel to monitor for potential objects being thrown off the hotel, or people in areas where they should not be. For example, they can sense and prevent entrance to rooftops or private areas that are not open to the public. Some clients install sensors throughout the perimeter of private property to safeguard executives and/or a VIP’s place of residence. Flow tracking and queuing capabilities Tracking crowd size can initiate digital signage or other digital experiences throughout the property to route guests to other destinations at the property. It can also help with queue analysis at the reservation/check-in desk or other areas where guests line up to tell operations to open another line to maintain the flow of guests passing. Flow tracking and queuing capabilities help casino operators to understand which games groups of customers frequent and allow for the optimisation of customer routing for increased interaction and playtime on the casino floor, quickly impacting the financial performance and return of the casino. No privacy concerns LiDAR provides a point cloud; its millions of little points in a 3D space create the silhouettes of moving or fixed objects The main hurdle right now is market adoption. LiDAR is an emerging technology that is not so widely known for these new use cases, says Becker. “It will take a little bit of time to educate the market on the vast capabilities that can now be realised in 3D beyond traditional IoT sensors that are available now,” he comments. One benefit of LiDAR is that it poses no risk of personally identifiable information (PII) and therefore no privacy concerns. No PII is captured with the technology. Cameras can capture images and transmit them over the network to other applications. However, LiDAR provides a point cloud; its millions of little points in a 3D space create the silhouettes of moving or fixed objects. IoT security strategy There is a lot of interest from surveillance and security to include marketing and operations, says Becker. “LiDAR will become a part of the IoT security strategy for countless casinos soon. It will be common practice to see LiDAR sensors deployed to augment existing security systems and provide more coverage.” Also, the intelligence gained with the accuracy of tracking guests anonymously provides peace of mind to the visitors that they are not being singled out or uniquely tracked but provides valuable data to the casinos that they have not been able to capture before. “This will help them maximise their operations and strategy for years to come,” says Becker.
Case studies
Balkans casino operator Merit International has deployed an advanced IDIS video solution at its newest luxury casino and hotel resort, the Starlit development in Budva, Montenegro. The company, which has a USD$1bn-plus portfolio of hospitality and gaming resorts in Northern Cyprus, Croatia, and Bulgaria, is aiming to set new standards in security, customer service, and business efficiency The 2,500-square-meter Starlit Resort & Casino is the company’s third and most ambitious development in Montenegro. A penthouse-level gaming area with stunning sea views, the resort also encompasses a luxury hotel complex, private residences and high-end guest facilities. Distributed control functionality The end-to-end IDIS video solution, installed by Volga Electronics Ltd, comprises more than 90 NDAA-compliant cameras, including 5MP IR domes and compact PTZs with true WDR and two-way audio; four 64-ch ready-to-install IDIS Solution Suite (ISS) servers with dual power; plus, all network accessories including specialist surveillance keyboards. The solution ensures HD coverage of the entire hotel and casino, including gaming tables, slot machines, and surrounding areas, allowing real-time monitoring of all transactions and activity. ISS federation services enable a centralised monitoring and management environment ISS federation services enable a centralised monitoring and management environment, and distributed control functionality, linking Merit’s various casinos and resorts and providing enhanced situational awareness. The VMS also supports integration with the casino’s ERP software, with transaction data overlayed on recorded video for efficient incident investigation. Merit is also testing AI-powered analytics including people counting and heat maps. The modular IDIS VMS infrastructure and plug-and-play installation of devices make it easier and faster to deploy deep learning analytics and target existing and new areas as required. AI-powered video analytics Koray Ozyildirim, IDIS Türkiye Country Manager, confirmed that the resort would be taking advantage of this future-proofing capability which is a benefit of all IDIS technology. “As well as ensuring the safety and satisfaction of guests, and providing a deterrent to would-be criminals, the IDIS solution opens new routes to harnessing AI-powered video analytics, for example with people counting, which can help to improve staff and resource allocation, as well as by taking a more proactive approach to security.” Customer spending patterns “The casino already has data collection systems, but heat maps can provide a unique extra layer of business intelligence – for example, allowing directional footfall and dwell time metrics to be compared to customer spending patterns; and revealing the most-used areas where customers spend time even when they are not spending money.” He added that this additional level of insight would give managers the confidence to change the positioning of gaming tables and slot machines, improve the utilisation of guest services staff, target promotions, and perfect the overall customer experience. Best surveillance capabilities Malik Oğuz, Surveillance Director, Merit International, welcomed the flexibility provided by the IDIS solution, and its potential for future enhancement with new AI capabilities. “As we continue to expand and build Merit International’s reputation for excellence, we are delighted with the value and performance of IDIS video solutions. IDIS gives us the best surveillance capabilities and the flexibility to adapt and take advantage of new AI video functions in the future as our security, safety, and business intelligence requirements evolve.”
A premier luxury resort with its location on an artificially created island that provides world-class luxurious accommodation, dining, and entertainment experiences. It is renowned for its lavish amenities and impeccable service, the resort is frequented by visitors from all over the world seeking an unforgettable experience of living in a beautiful setting. Overview The challenges the client faced were related to managing time and attendance across geographically dispersed locations within the resort. Moreover, a non-centralised attendance solution and less accurate palm geometry systems contributed to the failure of tracking employee attendance. Yet another challenge in this area was the seamless integration required with their current human resource management system and payroll applications, which would need a sophisticated solution to integrate with many database integrations. Challenges A complete end-to-end time-attendance management system was required for the following challenges: Multiple Brands Spread Across Locations: Geographically managing attendance across all locations of multiple brands demanded a system centralising all the data and providing unified management. No Centralised Solution for Attendance: There was no centralised attendance system as multiple brands were being used for attendance; it was really tough to monitor and manage employee attendance with precision at first and acted upon quickly. Low Identification Speed Using Palm Vein Technology: The palm vein devices had a very slow speed of identification, which caused a traffic jam at different check-in points, sometimes even resulting in differences in the records of attendance. Database Integration with HRMS: Integrating the attendance data with the existing HRMS was complicated because the involved systems were different from suppliers and required multiple database integrations. Payroll Integration: Attendance had to be integrated with the payroll system to evaluate and dispense the salary correctly. Solution Following are some of the solutions that Matrix implemented to resolve client challenges: A robust, comprehensive face recognition time-attendance system ensured the following solutions were in place: Centralised Time Attendance Management: Matrix installed its on-premise solution, COSEC CENTRA, for managing attendance from various different locations on the site. At entry points, the organisation installed the COSEC ARGO FACE devices and integrated them with the system to track attendance events in a unified manner and efficiently. Seamless Integration with Third-Party HRMS & Payroll: Matrix facilitated database-level integration so that the client could seamlessly connect to their prevalent HRMS and thus ensure that attendance data is correctly captured and integrated in payroll processing. Improved Speed in Identification through Face Recognition: The advanced face recognition system improved the speed and accuracy of attendance marking. High-speed face recognition in less than 0.5 seconds provided guaranteed reliable and accurate attendance records using COSEC ARGO FACE. Contactless Face Recognition with Bluetooth®: Matrix offered a contactless solution using face recognition and Bluetooth® Low Energy (BLE) through its COSEC ACS mobile app. It brings a better user experience in hygiene, safety, and speedy, efficient attendance marking. Results Matrix resolved the problem of the client with the delivery of a centralised, accurate, and seamless face recognition time attendance system. This was delivered to the client with results such as: Centralised Time Attendance Management: Improved management and control of attendance at locations. Seamless Integration with HRMS & Payroll: Increased efficiency and accuracy in the integration with HRMS and processing of payroll. Face Recognition for Faster Identification: Advanced face recognition system that gave dependable attendance records. Contactless Solution with Face & BLE: Heightened user experience with hygiene and safety, ensuring no-contact attendance tracking. Products Offered COSEC ARGO FACEM: Face-based Door Controller with MiFare Card Support COSEC CENTRA PLT1000: Platform Licence for 1000 Users COSEC CENTRA FR1000: Face Recognition Licence for 1000 Users This case study demonstrates how Matrix's face recognition time attendance system effectively addressed and resolved the client’s challenges, ensuring efficient and accurate management of employee attendance across multiple locations.
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.
The wellness resort situated in the Pune district offers restorative treatments including revitalising yoga therapies, naturopathy, and Ayurveda. Embracing a holistic approach, they seamlessly blend traditional methods such as acupressure, acupuncture, and physiotherapy with alternative therapies like bird watching, star gazing, and animal-assisted therapy. This unique fusion of rejuvenating treatments harnesses the power of nature to facilitate a radical transformation towards a beautiful life and optimal health. Challenges The resort encompasses various facilities like a hotel, administrative office, school, factory, and security office across a sprawling 68-acre site. Their existing consultant recommended PBX systems of the different brands along with digital handsets, that challenged the possibility of investment optimisation. Also, they were hesitant to abandon their current fiber network. To elaborate on their challenges: Adoption of modern communication with existing Infrastructure: Their investment in existing infrastructure needed protection, and a provision had to be made to modernise the communication using existing infrastructure. Managing different protocols: Interface with existing and different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Requirement of modern phone features: They required advanced features like Abbreviated Dialing, Call Pick Up, and Internal Call Restriction, to become efficient in day-to-day operations. Stipulated Time-frame: The inauguration date of the establishment was already made public and thus the task had to be completed within a stipulated time frame. Solution This included the Matrix range of IP-PBX, VoIP - FXO - FXS, and VoIP - PRI Gateways Matrix Comsec in partnership with SMB Automation analysed the challenges of communications and crafted a solution that was the best fit. The solution offered was based on the prelude of utilising existing infrastructure and amalgamation of Matrix Telecom Solutions within a stipulated time frame. This included the Matrix range of IP-PBX, VoIP - FXO - FXS, and VoIP - PRI Gateways that optimised the feasibility of communication and helped the firm become more efficient. The solution includes: The IP-PBX included ETERNITY GENX12SAC. This enabled them up to 240 Analog users with 64 CO Ports. Additionally, third-party PMS Integration with ETERNITY GENX12SAC was made possible. The VoIP - FXO - FXS Gateway included SETU VFX808, which enabled them a smooth transition to modern communication while maintaining existing infrastructure through features like 9 SIP accounts, peer-to-peer and proxy calling between distant locations, etc. The VOIP-PRI gateways included SETU VTEP, which comes with features of 125 SIP Trunks and up to 60 simultaneous calls. A third-party PBX was integrated with the gateway. The IP phones included SPARSH VP510E and SPARSH VP210. This came with features like an LCD Graphical display, Context-sensitive keys, Built-in 16 DSS Keys, Polyphonic ring tune, and much more. Results All the properties were brought to work on a single communication platform and proved to be beneficial The solution so implemented enabled them to reap the benefits of modern communication while also enabling them to make the best out of the existing infrastructure. Additionally, all the properties were brought to work on a single communication platform and proved to be beneficial in more than one way. The Hybrid IP-PBX enabled them to universal Network Connectivity through PSTN, GSM, and VoIP connectivity, LDAP Client Support to centralise and ease phonebook management, Logical Partitioning that prevents the conduct of any legal offenses related to Telecom regulations, and much more. The VoIP - FXO - FXS Gateway enabled them, VoIP access to traditional PBX, Multi-site connectivity with centralised telecom management, Next-generation conveyance facilities like call detail records of up to 2000 calls, Secure communication bridging with VoIP security over SRTP/TLS encryption, etc. The VOIP-PRI gateway, SETU VTEP, provided much-needed Least-cost routing ensuring that the call is always placed on the most appropriate network resulting in the optimisation of the feasibility of calls. The IP desk phones helped provide advanced features like Call Pick up, Call Forward, Call Waiting, and Call Transfer along with an Intuitive interface, that enabled employees to become efficient while simultaneously, enhancing user experience.
Jesolo is a popular holiday resort on the Italian Adriatic coast. To ensure security for locals and tourists on the busy beach and in public places, Panomera® multifocal sensor cameras from Dallmeier are in use. Five million tourists a year Jesolo is a town of about 26,000 inhabitants and more than five million tourists a year. The large increase in the number of visitors during the summer months requires a great deal of organisation from all parties involved, also regarding the safety and security of residents and tourists. Jesolo is located on the Italian Adriatic coast in the Veneto region. The resort is popular with tourists for its 15 kilometres of golden sandy beach, which has been awarded the Blue Flag, and for the many entertainment facilities on offer: events, theme parks, sports activities, shops, restaurants, and discos. In summer, Jesolo’s nightlife pulsates, and unfortunately, the risk of accidents and crime increases. Video technology for public security The challenge has been to monitor large public areas with as few cameras as possible The city has made considerable efforts in recent years to improve its security infrastructure to create a safe environment for its residents and visitors–and video technology is an important aspect of this. The challenge has been to monitor large public areas with as few cameras as possible, while maintaining high standards of image quality and ease of use. Conventional standard cameras could not meet these requirements–the image quality was simply not good enough. The security managers therefore decided to look for a new solution and found it in the Panomera® multifocal sensor cameras from German manufacturer Dallmeier. Fewer cameras, higher quality Panomera®’s patented camera technology has a number of features that make it unique in the industry. Multiple modules resp. sensors of different focal lengths are combined into a single system. Each module can be individually focused to capture a specific area of the overall image. As a result, multifocal sensor technology enables the simultaneous monitoring of large areas with high detail and exceptionally high resolution. In this way, Panomera® achieves an overall resolution over the object space that far exceeds that of conventional single-sensor cameras. Any number of “virtual” PTZs If an incident does occur, recorded video footage can be used to solve crimes and as evidence in court Another advantage is that unlike PTZ cameras, which are limited to a specific area, the Panomera® camera provides a comprehensive and detailed image of the entire surveillance zone–no matter where the security operator is focusing, there are theoretically any number of PTZ systems virtually available. For the operator in live mode, as well as for the forensic expert in recording mode. Multifocal sensor technology provides an optimal overview of the entire event and enables comprehensive monitoring in real time. This allows security personnel to respond quickly to potential threats. If an incident does occur, the recorded video footage can be used to solve crimes and as evidence in court. A safe environment Dallmeier video technology has been used in Jesolo since 2019. The city’s security managers were so satisfied with the system’s performance that they decided to extend it a few years later. Now, Panomera® cameras keep an eye on the main squares, streets, and sections of the beach. The Panomera® cameras make a significant contribution to improving public safety “The Panomera® cameras make a significant contribution to improving public safety. Especially during the night hours, inappropriate behaviour, and crimes such as vandalism or violence can occur. Thanks to video surveillance, suspicious activities can be quickly detected, and appropriate measures can be taken to prevent crimes or identify the perpetrators,” says Daniele Sisinio, Director Dallmeier Italia. Preventive measure And of course, video surveillance also serves as a preventive measure: the presence of cameras deters potential criminals and creates a safer environment. “Panomera® offers a unique combination of high resolution, optimal overview and intuitive operation,” explains Claudio Vanin, Local Police Commander. “The level of detail is simply amazing! And even in difficult conditions, like here near the sea, the cameras are robust and durable.” Data protection: “Privacy & Security by Design” Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence Video security systems must comply with country-specific and other supra-regional data protection regulations, such as the European General Data Protection Regulation (GDPR). Secure data management was therefore essential for the City of Jesolo. “Our products and solutions have the highest level of technical precautions that make it easy for the customer to implement a video security solution that complies with data protection regulations,” explains Daniele Sisinio. In accordance with the “Privacy & Security by Design” guideline, Dallmeier offers comprehensive options for data protection and data security settings on the product side–from setting up “private zones” to sophisticated access concepts and secure authentication procedures according to IEEE 802.1X. In addition, Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence in court. Image quality, security against tampering and protection against unauthorised access meet the LGC Forensics certification. Fit for the future The video system remains flexible, scalable, and expandable. Thanks to state-of-the-art technology, it can be easily adapted to changing requirements. Additional cameras can be easily integrated, and upgrades are seamless. The video system remains a reliable and effective surveillance solution for the future.
Newport Aquarium is located in Newport, Kentucky. The aquarium is home to thousands of the world’s most exotic aquatic creatures, including playful penguins, rare white alligators, and smiling sharks and stingrays. To keep the animals, visitors, and staff safe, Newport Aquarium wanted to replace their old security system with an easy-to-use and high-security access control solution. Sec-Tron, an experienced access control integrator, recommended Paxton’s flagship access control system Net2 to provide a simple and scalable security solution. Net2 is an advanced PC-based access control system that offers centralised administration. It is also designed to easily integrate with other access control systems, so site managers can enjoy more streamlined security for their building. Requirements The indisputable aquarium is encompassed by pipes and tanks, some full of chemicals With over 35 years of security industry experience, Sec-Tron specialises in providing custom access control solutions to commercial and industrial sites. Tom Riegler, Sales and Project Manager at Sec-Tron, said: “The whole aquarium is surrounded by pipes and tanks, some full of chemicals. They really needed access control at each area containing dangerous infrastructure to make sure only experienced employees could gain access and prohibiting visitors from accessing those sensitive areas.” The IT team at Newport Aquarium also wanted a system that utilised access cards, allowing them to customise employee ID cards as access cards and increasing access convenience. Author's quote David Fortunato, Senior Regional IT Manager at the Newport Aquarium, said: “Most of our doors used locks and keys, and some had swipe card readers. At the aquarium we have a lot of doors and a lot of employees who need to carry equipment up and down stairs, so looking for keys in front of a door is not ideal. We really wanted to have one system on our exterior and critical safety doors, and also make access convenient for our employees.” When sourcing a security system, the Newport Aquarium needed durable hardware because of its unique environment. David explains: “Even though the products are installed and secured in cases and locked rooms, being an aquarium, we have heavy amounts of moisture and salt in the air. It can chew up the products.” Net2 product demonstration We told them we could use all the existing cabling, readers, door handles and panels" Another factor that needed consideration when designing the installation was the possibility of integrating the aquarium’s existing wired infrastructure and security products with the new system. Tom said: “We did a Net2 product demonstration to Newport Aquarium’s IT team. We told them we could use all the existing cabling, readers, door handles and panels. We said we could retrofit the existing hardware with the Net2 door controllers and make it a clean installation.” Solution Tom and his team at Sec-Tron installed Net2 at the aquarium. Tom said: “The expandability of the new system was the customer’s main concern. They also liked Net2’s pricing structure.” The Net2 software can manage up to 1,000 doors and 50,000 users and requires no licence fees, making it a cost-effective and scalable security solution. The Newport Aquarium now uses employee ID cards as Net2’s access tokens. The employees scan their IDs at the staff entrance and go through physical screening to enter the aquarium. Once they are in the park, they need to present badges at each door to be given access for a certain number of hours, based on their role and duties. Features of Net2 It is one of the biggest benefits that Net2 has brought, that we could replace all those keys" David said: “With our old lock-and-key doors, it was hard to keep track of keys. It is one of the biggest benefits that Net2 has brought, that we could replace all those keys with badges and just keep a few keys for emergencies. It provides better tracking, higher security, and greater convenience for our employees.” David further explains how they maximise the features of Net2: “We use the timeline feature to tailor access hours and levels of each door. When it’s after the aquarium’s opening time, we lock the doors to prevent unauthorised access. Another feature we use a lot is the intruder alarm relay. If someone accidentally goes through our emergency exit, it will sound the horn through the relay and alert our staff to go check and make sure no one has gone to an area that they are not supposed to.” Result David manages the security systems for three theme parks under Herschend Family Entertainment Corp, the other two are Kentucky Kingdom & Hurricane Bay and Adventure Aquarium. The Newport Aquarium is their first Net2 installation, and they have plans to expand Net2 to their other sites. David said: “We are doing the installation in phases. We started with 15 doors at the Newport Aquarium and now it’s fitted across 53 doors. We have a plan to put Net2 on every possible door as it is just much more convenient and safer than keys, and everything is documented. We have also started putting Net2 in the Kentucky Kingdom, which is currently at its phase 1 with around 20 doors. Our other Adventure Aquarium in Philadelphia, the existing security system doesn’t offer great access convenience while maintaining the security level that we require, so we have a plan to install Net2 there as well.”
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download